ethics demo ko

35
Ethics in Info. Com. Tech.

Upload: jomz-velasquez

Post on 26-Nov-2015

21 views

Category:

Documents


0 download

TRANSCRIPT

Ethics in Info. Com. Tech.

1

Objectives:At the end of the lesson, the 3rd Year CoEd will be able to To be able to define the word ethics and to know the importance and act according to a code of principles;To address ethical, legal and other issues involved in using internet,To have a clear understanding of Intellectual Property Rights (IPR) in digital environment,To explore possible solution in addressing these issues, andTo explore possible solution in addressing these issues, and2INTRODUCTIONGlobalization and digital convergence in the emerging knowledge society has raised complex ethical, legal and societal issues. We are faced with complex and difficult questions regarding the freedom of expression, access to information, the right to privacy, intellectual property rights, and cultural diversity. ICT is an instrumental need of all humans for the gathering of information and knowledge, and as such, should be guaranteed as a basic right to all human beings. 3All over the world, rights that are already legally recognised are daily being violated, whether in the name of economic advancement, political stability, religious causes, the campaign against terrorism, or for personal greed and interests. Violations of these rights have created new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have affected peoples lives either directly or indirectly.INTRODUCTION contd..4

What is Ethics?5Definition: Ethic, ethical, ethicsEthics is concerned with issues of value, such as judgments about what constitutes "good" or "bad" behavior in any given context. Ethics are the standards, values, morals, principles, etc., which guide one's decisions or actions. ICT Ethics relate to the standards of conduct governing individual, institutions societies & or international use of information & communication technology (Merriam-Websters Collegiate Dictionary)

6Moral codeSet of rules Establishes boundaries of generally accepted behaviorDifferent rules often have contradictionsMoralitySocial conventions about right and wrongWidely shared

7Morality may vary by:AgeCultural groupEthnic backgroundReligionGender

8The Importance of IntegrityIntegrity is a cornerstone of ethical behaviourPeople with integrity Act in accordance with a personal code of principlesExtend to all people the same respect and consideration that you desireApply the same moral standards in all situations

9

10THE ETHICAL, LEGAL AND OTHER ISSUES INVOLVED IN USE OF ICT

11

NetiquettesETHICS GOVERNING INTERNET - acceptable behavior on the Net, mostly related to use of e-mail and relay chatFor Example: Be brief, keep paragraphs shortTry to use mixed upper and lowercaseUse CAPITALS & special characters for emphasis onlyDo not SPAM or send junk e-mailRefrain from flaming (sending hate messages)Follow acceptable standards of politeness as used in all kinds of communicationBe wary of virus hoaxes, urban legends and chain letters

12Intellectual Property Rights

13Plagiarism using somebody elses work and claiming it as your ownCopyright Law protection of the authors original workFair Use reproduction of materials for educational and research purposeSoftware piracy theft and illegal reproduction of softwareFile swapping exchange of digital materials like audio and video over the Net without the owners permission

Intellectual Property Rights (contd)

14Civil liberties issues regarding the rights of an individual Freedom of speech ability to express oneself on the InternetPersonal privacy and records confidentiality handling of personal information, e-mail and other electronic correspondencein the USA the FBI uses a software named Carnivore to spy on e-mail passing through ISPs collection of users data i.e. personal information and browsing habits by some software (spyware), and using it directly or selling it for a profitCensorship regulation or control of contentfor example: use of blocking or filtering software

15Cybercrimes (Computer facilitated crimes)

Hacking / Cracking breaking-in to computer systems with or without malicious intentDissemination of Viruses, Worms, Trojan Horses, and other similar destructive software Denial of service and other attacks Internet Fraud false advertisement and malpractices of individuals and companies Spamming sending unsolicited e-mailFlaming sending of hate messagesPornography proliferation of obscene and indecent materials

16Some issues of IPR in digital environment

17Shima Mohd - Master In Instructional Technology Faculty Of Education, University Of MalayaIntellectual Property RightsIntellectual property (IP) refers to works by created by inventors, authors and artists. These works are unique and have value in the market place.

Intellectual property laws cover ideas, inventions, literary, creations, unique names, business models, industrial processes, computer program codes and more.Shima Mohd - Master In Instructional Technology Faculty Of Education, University Of MalayaPatents for inventionTrademarks for brand identity Designs for product appearance Copyright for material.There are four types of Intellectual Property protectionRecap of copyrightIPR and E-learningTeacherStudents LibrariesPeer to peer sharing of filesE-publishing and open AccessOpen Source and Open AccessLicensing

Some issues of IPR in digital environment20Nature of CopyrightExclusive right given by law for a certain term of years to an author, composer, designer, etc to print, publish, and sell copies of his original work.Applies to literary, dramatic, musical work, computer program, artistic work, irrespective of the media- paper, cinematographic films including sound track and video films, records, CDs, tapes, DVDs, VCDs Given to a person or organization responsible for creation/intellectual input, skill to a work.

Nature of copyrightMultiple nature of rights: bundle of different rights in the same work To reproduce and store in any material form and mediumTo issue copies to the publicTo perform in public or communicate to the publicTo make film or recording in respect of the workTranslation, adaptation and to do the above in respect of translation and adaptation.To sell or give on hire, or offer for sale or hire any copy of the computer program, regardless of whether such copy has been sold or given on hire on earlier occasions.

Acts of infringementDoing without license or permission Acts that the owner has exclusive rights (reproduction, communication, performance in public, adaptation and translation)Permits for profit any place to be used for communicationMakes for sale or hire or sells for hireDistributesExhibitsimportsCopyingCasual connection: objective similarityIndirect copying: 2-D to 3-D, adaptationSubstantial copying: How much is reasonable? The legislation does not specify a percentage that is acceptable in all circumstances. The courts would look to see whether all or a "substantial part" of the work has been copied. "substantial" can relate to quality just as much as quantity. A small but key part of the work could be ruled by a court to be a "substantial part

In Addressing these Ethical Issues

Ethics in Information TechnologyPublic concern about the ethical use of information technology includes:E-mail and Internet access monitoringPeer-to-peer networks violation of copyrightUnsolicited e-mailHackers and identify theftPlagiarismCookies and spyware26Ethics in Information Technology (continued)The general public has not realized the critical importance of ethics as applied to ITImportant technical decisions are often left to technical expertsGeneral business managers must assume greater responsibility for these decisionsThey must be able to make broad-minded, objective, ethical decisions based on technical savvy, business know-how, and a sense of ethicsThey must also try to create a working environment in which ethical dilemmas can be discussed openly, objectively, and constructively27

28

CYBER CRIME OF THEPHILIPPINES known as R A No. 10175

29Fifteenth CongressSecond Regular Session

Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven.

[ Republic Act No. 10175 ]

AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFORE AND FOR OTHER PURPOSES.

Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled:

30Video Presentation7-step approach to ethical decision makingTrends contributing to the risk of using information technology unethically include:Growth of the InternetAbility to capture and store vast amounts of personal data onlineGreater reliance on information systems33Referenceshttp://www.slideshare.net/aleeya91/ict-computer-ethicshttps://www.google.com.ph/#q=ethics+in+ICT.ppthttp://www.tomw.net.au/technology/it/ictethics.shtmlhttp://en.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012http://www.ccsr.cse.dmu.ac.uk/resources/general/ethicol/Ecv8no2.htmlhttp://www.youtube.com/watch?v=sIFfYxgDpRo

For viewing and Listening to my report..Sir jomz35